Zarinpal Gateway for WooCommerce <= 5.0.16 - Improper Access Control to Payment Status Update

Improper Access Control
CVE CVE-2026-2592
CVSS High (7.7)
Publicly Published February 16, 2026
Last Updated February 17, 2026
Researcher shark3y
Description

The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callback handler 'Return_from_ZarinPal_Gateway' failing to validate that the authority token provided in the callback URL belongs to the specific order being marked as paid. This makes it possible for unauthenticated attackers to potentially mark orders as paid without proper payment by reusing a valid authority token from a different transaction of the same amount.

References

1 affected software package

Software Type Plugin
Software Slug zarinpal-woocommerce-payment-gateway (view on wordpress.org)
Patched? Yes
Affected Version
  • <= 5.0.16
Patched Version
  • 5.0.17
This record contains material that is subject to copyright

Copyright 2012-2026 Defiant Inc.
License: Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute this software vulnerability information. Any copy of the software vulnerability information you make for such purposes is authorized provided that you include a hyperlink to this vulnerability record and reproduce Defiant's copyright designation and this license in any such copy. License Detail.